Descriptor
Computer Networks | 2 |
Information Networks | 2 |
Privacy | 2 |
Change | 1 |
Civil Liberties | 1 |
Computer Mediated… | 1 |
Confidential Records | 1 |
Credit (Finance) | 1 |
Data Analysis | 1 |
Data Collection | 1 |
Databases | 1 |
More ▼ |
Source
Library Hi Tech | 2 |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Opinion Papers | 1 |
Education Level
Audience
Media Staff | 2 |
Practitioners | 2 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Lynch, Clifford A. – Library Hi Tech, 1997
Reviews traditional issues surrounding authorization and authentication in an organization-centered framework and introduces new interorganizational issues that dominate networked information environment. Describes three major approaches to authentication and authorization for the interorganizational environment and discusses the following…
Descriptors: Change, Computer Mediated Communication, Computer Networks, Information Networks

Rubin, Michael Rogers – Library Hi Tech, 1987
Describes the development and current uses of computerized databases of information about individuals by the government and private agencies, especially credit bureaus, and discusses three major categories of abusive information practices that threaten personal privacy: information collection, information dissemination, and information management…
Descriptors: Civil Liberties, Computer Networks, Confidential Records, Credit (Finance)